Zero Trust and IT, IoT and OT - How to Start and How to be Sure
The Zero Trust model of information security has become a fixture in both the strategies of enterprise security teams and the roadmaps of security solution developers, and for good reason. Perimeter-focused security architectures that default to high trust levels on the internal network continue to fail disastrously and expensively. Zero Trust protects sensitive data by limiting access to only those who require it and strictly enforcing access through intelligent access control and network segmentation.
The session addresses:
- Explore options for where to start with a Zero Trust Model in your enterprise and finding quick wins;
- Understand the challenge of assuring the effectiveness of Zero Trust controls and an innovative approach to obtaining assurance;